Connect with us


Crooks are targeting this easy money app on your phone



Crooks are targeting this easy money app on your phone

Venmo has grown in popularity, and for a good reason, because it is so easy and convenient to send and receive money electronically between you and another person. 

It operates as a digital wallet linked to your bank account or debit card, which enables you to make payments quickly and easily to other Venmo users. The service is popular among younger generations as it provides a simple and social way to split bills or pay back friends for shared expenses.

Additionally, Venmo offers a social feed feature that allows you to see and comment on your friends’ transactions, adding an element of social interaction to the platform. It is available for both iPhone and Android devices.

iPhone: 4.9 stars (at time of publishing)

Android: 4.2 stars (at time of publishing)


However, with all that ease comes much targeting from scammers who want to steal your money, although unlike U.S. bank accounts, Venmo balances are not insured by the Federal Deposit Insurance Corp. 

Let’s review what kind of Venmo scams to look out for and how to protect yourself.


Venmo is an app that lets you pay from a linked bank account or debit card. (



Is Venmo safe to use?

Venmo uses multi-factor authentication to secure logins and encrypts all transactions to ensure the safety of your personal information. Also, you have the ability to manage your privacy and passcode settings, adding another layer of protection to your Venmo account. As a result, I would say Venmo is generally considered a safe platform to use.

However, it was designed to use with people you know and trust, such as your friends and family members, and not random people you’ve never met. When making a transaction with a person for the first time, Venmo will even ask that you enter the person’s last four digits of their phone number as an extra safety precaution.


Even with these safety measures, however, people still get tricked by scams on Venmo. A common trick that scammers will use is phishing emails. A scammer will send you an email and claim to be a representative of Venmo and trick you into revealing sensitive information, such as passwords, credit card numbers, or personal details by asking you to send your personal information or click a suspicious link to “update your password” or something of that nature. These emails often mimic legitimate communications.

These kinds of scams can occur via text message or phone call as well, and unsuspecting victims may accidentally give out their banking information or even their Social Security numbers.



Screenshot of a Venmo scam.

Scammers are using phishing emails to trick you into giving away your information. Here’s what to know.items (

Scammers who are trying to sell you things online, such as on websites like Craigslist or Facebook Marketplace, will also often ask for people to pay them through Venmo. This is because Venmo’s user agreement and terms of service state that the app is meant to be used for transactions between people who know each other personally or have an established business relationship.

Scammers may ask for payment through Venmo because they know that the app lacks buyer protections and dispute resolution options. Venmo transactions are instant and irreversible, which means that if you send money to a scammer, it may be difficult or impossible to get your money back.


What types of Venmo scams should I look out for?

  • Requests for personal information: Venmo will never ask you for personal or sensitive information via email, text message, or phone.
  • Rental lease offers: If you’re looking for a place to rent and the landlord asks you to pay upfront via Venmo, don’t fall for it.
  • Random prizes or rewards: Sometimes scammers will put up fake competitions and offer to send prize money via Venmo, but will then ask for a person’s Venmo login info to send the money. This is a common scam.
  • Overpayment scams: Scammers may overpay you for an item or service and ask you to refund the difference. Once you refund the money, the scammer cancels the payment, leaving you with no money and no item or service.


How can I avoid being part of a Venmo scam?

  • Look at the email address: Look closely at the address of the sender if they claim to be from Venmo. If you Google it and it’s an official email address, then it should come up right away. If it doesn’t, then it’s not really Venmo.
  • Watch out for fake accounts: Scammers commonly create fake Venmo accounts claiming to be real people and will then ask family and friends of that person for money. Reach out to a person directly before sending them money.
  • Public transactions: Be cautious about making your transactions public on Venmo, as scammers can use this information to target you with phishing scams or other fraudulent activities.


What to do if you believe you have been scammed on Venmo

1) The first thing you should do is contact Venmo support immediately and report the fraudulent transaction. They can provide guidance and assistance in resolving the issue.


2) Second, if you used your bank account or credit card to fund the Venmo transaction, contact your bank or credit card issuer to report the fraud and dispute the charge.

3) The third step is to change your Venmo password immediately to prevent further unauthorized transactions.

4) Also, if you believe you have been scammed, you can file a complaint with the Federal Trade Commission (FTC) to report the fraudulent activity.

5) If you feel your personal data has been stolen, and you want a service that will walk you through every step of the reporting and recovery process, one of the best things you can do to protect yourself from this type of fraud is to subscribe to an identity theft protection company.  



This service will monitor personal information like your Home title, Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. One of the best parts of using some services is that they might include identity theft insurance of up to 1 million dollars to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses.

See my tips and best picks on how to protect yourself from identity theft by visiting

6) Lastly, always report the scammer. If you have any information about the scammer, such as their name, phone number, or email address, report it to Venmo and the authorities.


Kurt’s key takeaways

While Venmo is a convenient and widely used platform for electronic money transfers, you should remain vigilant against scams by being cautious of phishing emails, avoiding transactions with unknown individuals, and protecting personal information. If scammed, you should report the incident to Venmo, contact your bank or credit card issuer, change your password and file a complaint with the FTC while also providing any available information about the scammer to authorities. 


Do you feel protected against the growing number of scams? What are your tools and tips? Let us know so we can alert others by writing us at

For more of my tips, subscribe to my free CyberGuy Report Newsletter by heading to

Copyright 2023 All rights reserved.



How to Run Your Own ChatGPT-Like LLM for Free (and in Private)



How to Run Your Own ChatGPT-Like LLM for Free (and in Private)

The power of large language models (LLMs) such as ChatGPT, generally made possible by cloud computing, is obvious, but have you ever thought about running an AI chatbot on your own laptop or desktop? Depending on how modern your system is, you can likely run LLMs on your own hardware. But why would you want to?

Well, maybe you want to fine-tune a tool for your own data. Perhaps you want to keep your AI conversations private and offline. You may just want to see what AI models can do without the companies running cloud servers shutting down any conversation topics they deem unacceptable. With a ChatGPT-like LLM on your own hardware, all of these scenarios are possible.

And hardware is less of a hurdle than you might think. The latest LLMs are optimized to work with Nvidia graphics cards and with Macs using Apple M-series processors—even low-powered Raspberry Pi systems. And as new AI-focused hardware comes to market, like the integrated NPU of Intel’s “Meteor Lake” processors or AMD’s Ryzen AI, locally run chatbots will be more accessible than ever before.

Thanks to platforms like Hugging Face and communities like Reddit’s LocalLlaMA, the software models behind sensational tools like ChatGPT now have open-source equivalents—in fact, more than 200,000 different models are available at this writing. Plus, thanks to tools like Oobabooga’s Text Generation WebUI, you can access them in your browser using clean, simple interfaces similar to ChatGPT, Bing Chat, and Google Bard.

The software models behind sensational tools like ChatGPT now have open-source equivalents—in fact, more than 200,000 different models are available.


So, in short: Locally run AI tools are freely available, and anyone can use them. However, none of them is ready-made for non-technical users, and the category is new enough that you won’t find many easy-to-digest guides or instructions on how to download and run your own LLM. It’s also important to remember that a local LLM won’t be nearly as fast as a cloud-server platform because its resources are limited to your system alone.

Nevertheless, we’re here to help the curious with a step-by-step guide to setting up your own ChatGPT alternative on your own PC. Our guide uses a Windows machine, but the tools listed here are generally available for Mac and Linux systems as well, though some extra steps may be involved when using different operating systems.

Some Warnings About Running LLMs Locally

First, however, a few caveats—scratch that, a lot of caveats. As we said, these models are free, made available by the open-source community. They rely on a lot of other software, which is usually also free and open-source. That means everything is maintained by a hodgepodge of solo programmers and teams of volunteers, along with a few massive companies like Facebook and Microsoft. The point is that you’ll encounter a lot of moving parts, and if this is your first time working with open-source software, don’t expect it to be as simple as downloading an app on your phone. Instead, it’s more like installing a bunch of software before you can even think about downloading the final app you want—which then still may not work. And no matter how thorough and user-friendly we try to make this guide, you may run into obstacles that we can’t address in a single article.

Also, finding answers can be a real pain. The online communities devoted to these topics are usually helpful in solving problems. Often, someone’s solved the problem you’re encountering in a conversation you can find online with a little searching. But where is that conversation? It might be on Reddit, in an FAQ, on a GitHub page, in a user forum on HuggingFace, or somewhere else entirely. 

AI is quicksand. Everything moves whip-fast, and the environment undergoes massive shifts on a constant basis.


It’s worth repeating that open-source AI is moving fast. Every day new models are released, and the tools used to interact with them change almost as often, as do the underlying training methods and data, and all the software undergirding that. As a topic to write about or to dive into, AI is quicksand. Everything moves whip-fast, and the environment undergoes massive shifts on a constant basis. So much of the software discussed here may not last long before newer and better LLMs and clients are released.

Bottom line: Proceed at your own risk. There’s no Geek Squad to call for help with open-source software; it’s not all professionally maintained; and you’ll find no handy manual to read or customer service department to turn to—just a bunch of loosely organized online communities.

Finally, once you get it all running, these AI models have varying degrees of polish, but they all carry the same warnings: Don’t trust what they say at face value, because it’s often wrong. Never look to an AI chatbot to help make your health or financial decisions. The same goes for writing your school essays or your website articles. Also, if the AI says something offensive, try not to take it personally. It’s not a person passing judgment or spewing questionable opinions; it’s a statistical word generator made to spit out mostly legible sentences. If any of this sounds too scary or tedious, this may not be a project for you.

Select Your Hardware

Before you begin, you’ll need to know a few things about the machine on which you want to run an LLM. Is it a Windows PC, a Mac, or a Linux box? This guide, again, will focus on Windows, but most of the resources referenced offer additional options and instructions for other operating systems.

You also need to know whether your system has a discrete GPU or relies on its CPU’s integrated graphics. Plenty of open-source LLMs can run solely on your CPU and system memory, but most are made to leverage the processing power of a dedicated graphics chip and its extra video RAM. Gaming laptops, desktops, and workstations are better suited to these applications, since they have the powerful graphics hardware these models often rely on.


Lenovo Legion Pro 7i Gen 8

Gaming laptops and mobile workstations offer the best hardware for running LLMs at home. (Credit: Molly Flores)

In our case, we’re using a Lenovo Legion Pro 7i Gen 8 gaming notebook, which combines a potent Intel Core i9-13900HX CPU, 32GB of system RAM, and a powerful Nvidia GeForce RTX 4080 mobile GPU with 12GB of dedicated VRAM.

If you’re on a Mac or Linux system, are CPU-dependent, or are using AMD instead of Intel hardware, be aware that while the general steps in this guide are correct, you may need extra steps and additional or different software to install. And the performance you see could be markedly different from what we discuss here.

Set Up Your Environment and Required Dependencies

To start, you must download some necessary software: Microsoft Visual Studio 2019. Any updated version of Visual Studio 2019 will work (though not newer annualized releases), but we recommend getting the latest version directly from Microsoft.

Microsoft Visual Studio 2019 download page

(Credit: Brian Westover/Microsoft)


Personal users will be fine to skip the Enterprise and Professional versions and use just the BuildTools version of the software.

Microsoft Visual Studio 2019 download page

Find the latest version of Visual Studio 2019 and download the BuildTools version (Credit: Brian Westover/Microsoft)

After choosing that, be sure to select “Desktop Development with C++.” This step is essential in order for other pieces of software to work properly.

Microsoft Visual Studio 2019 download selection

Be sure to select “Desktop development with C++.” (Credit: Brian Westover/Microsoft)

Begin your download and kick back: Depending on your internet connection, it could take several minutes before the software is ready to launch.


Microsoft Visual Studio 2019 download progress

(Credit: Brian Westover/Microsoft)

Download Oobabooga’s Text Generation WebUI Installer

Next, you need to download the Text Generation WebUI tool from Oobabooga. (Yes, it’s a silly name, but the GitHub project makes an easy-to-install and easy-to-use interface for AI stuff, so don’t get hung up on the moniker.)

Text Generation WebUI tool from Oobabooga GitHub page

(Credit: Brian Westover/Oobabooga)

To download the tool, you can either navigate through the GitHub page or go directly to the collection of one-click installers Oobabooga has made available. We’ve installed the Windows version, but this is also where you’ll find installers for Linux and macOS. Download the zip file shown below.

One-click installer packages for Text Generation WebUI

(Credit: Brian Westover/Oobabooga)


Create a new file folder someplace on your PC that you’ll remember and name it AI_Tools or something similar. Do not use any spaces in the folder name, since that will mess up some of the automated download and install processes of the installer.

Local folder for Text Generation WebUI files

(Credit: Brian Westover/Microsoft)

Then, extract the contents of the zip file you just downloaded into your new AI_Tools folder.

Run the Text Generation WebUI Installer

Once the zip file has been extracted to your new folder, look through the contents. You should see several files, including one called start_windows.bat. Double-click it to begin installation.

Depending on your system settings, you might get a warning about Windows Defender or another security tool blocking this action, because it’s not from a recognized software vendor. (We haven’t experienced or seen anything reported online to indicate that there’s any problem with these files, but we’ll repeat that you do this at your own risk.) If you wish to proceed, select “More info” to confirm whether you want to run start_windows.bat. Click “Run Anyway” to continue the installation.


Installation warning

(Credit: Brian Westover/Microsoft)

Now, the installer will open up a command prompt (CMD) and begin installing the dozens of software pieces necessary to run the Text Generation WebUI tool. If you’re unfamiliar with the command-line interface, just sit back and watch.

Installation CMD window

(Credit: Brian Westover/Microsoft)

First, you’ll see a lot of text scroll by, followed by simple progress bars made up of hashtag or pound symbols, and then a text prompt will appear. It will ask you what your GPU is, giving you a chance to indicate whether you’re using Nvidia, AMD, or Apple M series silicon or just a CPU alone. You should already have figured this out before downloading anything. In our case, we select A, because our laptop has an Nvidia GPU.

Installation GPU check

(Credit: Brian Westover/Microsoft)


Once you’ve answered the question, the installer will handle the rest. You’ll see plenty of text scroll by, followed first by simple text progress bars and then by more graphically pleasing pink and green progress bars as the installer downloads and sets up everything it needs.

Text Generation WebUI installation progress

(Credit: Brian Westover/Microsoft)

At the end of this process (which may take up to an hour), you’ll be greeted by a warning message surrounded by asterisks. This warning will tell you that you haven’t downloaded any large language model yet. That’s good news! It means that Text Generation WebUI is just about done installing.

Text Generation WebUI tool "no model" warning

(Credit: Brian Westover/Microsoft)

At this point you’ll see some text in green that reads “Info: Loading the extension gallery.” Your installation is complete, but don’t close the command window yet.


Text Generation WebUI installer green text

(Credit: Brian Westover/Microsoft)

Copy and Paste the Local Address for WebUI 

Immediately below the green text, you’ll see another line that says “Running on local URL: http://127.0.01:7860.” Just click that URL text, and it will open your web browser, serving up the Text Generation WebUI—your interface for all things LLM.

Text Generation WebUI installer green text and local URL

(Credit: Brian Westover/Microsoft)

You can save this URL somewhere or bookmark it in your browser. Even though Text Generation WebUI is accessed through your browser, it runs locally, so it’ll work even if your Wi-Fi is turned off. Everything in this web interface is local, and the data generated should be private to you and your machine.

Text Generation WebUI open in browser

(Credit: Brian Westover/Oobabooga)


Close and Reopen WebUI

Once you’ve successfully accessed the WebUI to confirm it’s installed correctly, go ahead and close both the browser and your command window.

In your AI_Tools folder, open up the same start_windows batch file that we ran to install everything. It will reopen the CMD window but, instead of going through that whole installation process, will load up a small bit of text including the green text from before telling you that the extension gallery is loaded. That means the WebUI is ready to open again in your browser.

Text Generation WebUI open in browser

(Credit: Brian Westover/Oobabooga)

Use the same local URL you copied or bookmarked earlier, and you’ll be greeted once again by the WebUI interface. This is how you will open the tool in the future, leaving the CMD window open in the background.

Select and Download an LLM

Now that you have the WebUI installed and running, it’s time to find a model to load. As we said, you’ll find thousands of free LLMs you can download and use with WebUI, and the process of installing one is pretty straightforward.


If you want a curated list of the most recommended models, you can check out a community like Reddit’s /r/LocalLlaMA, which includes a community wiki page that lists several dozen models. It also includes information about what different models are built for, as well as data about which models are supported by different hardware. (Some LLMs specialize in coding tasks, while others are built for natural text chat.)

These lists will all end up sending you to Hugging Face, which has become a repository of LLMs and resources. If you came here from Reddit, you were probably directed straight to a model card, which is a dedicated information page about a specific downloadable model. These cards provide general information (like the datasets and training techniques that were used), a list of files to download, and a community page where people can leave feedback as well as request help and bug fixes.

At the top of each model card is a big, bold model name. In our case, we used the the WizardLM 7B Uncensored model made by Eric Hartford. He uses the screen name ehartford, so the model’s listed location is “ehartford/WizardLM-7B-Uncensored,” exactly how it’s listed at the top of the model card.

Next to the title is a little copy icon. Click it, and it will save the properly formatted model name to your clipboard.

Hugging Face LLM model card

(Credit: Brian Westover/Hugging Face)


Back in WebUI, go to the model tab and enter that model name into the field labeled “Download custom model or LoRA.” Paste in the model name, hit Download, and the software will start downloading the necessary files from Hugging Face.

Text Generation WebUI model download

(Credit: Brian Westover/Oobabooga)

If successful, you’ll see an orange progress bar pop up in the WebUI window and several progress bars will appear in the command window you left open in the background.

Text Generation WebUI model download progress

(Credit: Brian Westover/Oobabooga)

CMD window model download progress

(Credit: Brian Westover/Oobabooga)


Once it’s finished (again, be patient), the WebUI progress bar will disappear and it will simply say “Done!” instead.

Load Your Model and Settings in WebUI

Once you’ve got a model downloaded, you need to load it up in WebUI. To do this, select it from the drop-down menu at the upper left of the model tab. (If you have multiple models downloaded, this is where you choose one to use.)

Before you can use the model, you need to allocate some system or graphics memory (or both) to running it. While you can tweak and fine-tune nearly anything you want in these models, including memory allocation, I’ve found that setting it at roughly two-thirds of both GPU and CPU memory works best. That leaves enough unused memory for your other PC functions while still giving the LLM enough memory to track and hold a longer conversation.

Text Generation WebUI model settings

(Credit: Brian Westover/Oobabooga)

Once you’ve allocated memory, hit the Save Settings button to save your choice, and it will default to that memory allocation every time. If you ever want to change it, you can simply reset it and press Save Settings again.


Enjoy Your LLM!

With your model loaded up and ready to go, it’s time to start chatting with your ChatGPT alternative. Navigate within WebUI to the Text Generation tab. Here you’ll see the actual text interface for chatting with the AI. Enter text into the box, hit Enter to send it, and wait for the bot to respond.

Text Generation WebUI with model running

(Credit: Brian Westover/Oobabooga)

Here, we’ll say again, is where you’ll experience a little disappointment: Unless you’re using a super-duper workstation with multiple high-end GPUs and massive amounts of memory, your local LLM won’t be anywhere near as quick as ChatGPT or Google Bard. The bot will spit out fragments of words (called tokens) one at a time, with a noticeable delay between each.

However, with a little patience, you can have full conversations with the model you’ve downloaded. You can ask it for information, play chat-based games, even give it one or more personalities. Plus, you can use the LLM with the assurance that your conversations and data are private, which gives peace of mind.

You’ll encounter a ton of content and concepts to explore while starting with local LLMs. As you use WebUI and different models more, you’ll learn more about how they work. If you don’t know your text from your tokens, or your GPTQ from a LoRA, these are ideal places to start immersing yourself in the world of machine learning.


Like What You’re Reading?

Sign up for Tips & Tricks newsletter for expert advice to get the most out of your technology.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.

Continue Reading


Steps to delete your personal information from the dark web



Steps to delete your personal information from the dark web

Have you ever wondered what to do if your identity is stolen and sold on the dark web? Many people face this scary situation every day, and they don’t know how to deal with it. That includes Mary of Upper Chichester, Pennsylvania.

“I have a major issue with my Motorola Android cell phone. Motorola’s tech department wasn’t helpful at all.

“I was alerted by Capital One that my identity was being sold on the dark web. I did contact all of the credit reporting agencies to notify them and place alerts on my credit report. That’s about all I have done so far. My issue is how do I remove my personal information from the dark web and is my phone now useless?

“Do I need to get a new phone or is there any easy way to secure my current phone?

Woman smiles at her Android (



“I’m worried about someone using my personal information to commit criminal acts using my identity. Please tell me the easiest way to rectify this scary situation. What should I do next?”

Mary, Upper Chichester, PA

Mary, I’m sorry to hear that your identity was being sold on the dark web. I’m glad you contacted the credit reporting agencies to alert them and place alerts on your credit report. That’s one of several smart moves to protect your credit from fraud. As for removing your personal information from the dark web, fortunately, there are several ways to approach this, which we’ll get into below.

What do I do if my data has been stolen?


Log out of all of your accounts: If you see that your information was part of any sort of breach, you should first log out of all your accounts on every web browser on your computer. Once you’ve done that, you should clear your cookies and cache.

Change your password: If your password was compromised, be sure to change it immediately. Consider using a password manager to generate and store complex passwords.


Remove yourself from the internet: While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously. By doing so, it would significantly decrease the chances of a scammer being able to get you information to target you.

Hacker on a computer

Hackers looking a computer. (




Invest in Antivirus protection: The best way to protect yourself from accidentally clicking a malicious link that would allow hackers access to your personal information is to have antivirus protection installed and actively running on all your devices.

See my expert review of the best antivirus protection for your Windows, Mac, Android & iOS devices.

Do you need a new phone if your personal info is on the dark web?

As for your Android phone, you should be sure to do a malware scan and implement necessary security measures to prevent hackers from accessing it again. Here are some steps you can take to secure your Android phone from hackers:


Do a malware scan of your Android device. You should scan your phone with reputable antivirus protection, and remove any suspicious apps or files.

  • Phishing and malware are common tactics that hackers use to trick you into clicking on malicious links or attachments that can infect your Android phone with spyware or ransomware.
  • You should be careful about opening emails, texts, or messages from unknown senders or sources that look suspicious or too good to be true.
  • Avoid downloading apps from unofficial sources or websites that may contain malware.

Update your software: Make sure you have the latest version of Android and any apps you use on your phone. Software updates often fix security vulnerabilities that hackers can exploit. You can check for updates in your phone’s settings or in the Google Play Store. Learn how to update your Android or iPhone.

Use a strong password or PIN: Lock your phone with a password or PIN that is hard to guess or crack. You can also use biometric authentication, such as fingerprint or face recognition, if your phone supports it. You should also change your passwords and log out of any accounts that may have been compromised.

Enable two-factor authentication: Two-factor authentication (2FA) adds an extra layer of security to your online accounts by requiring you to enter a code or use an app to verify your identity when you log in. You can enable 2FA on services that offer it, such as Google, Facebook, Twitter, etc. You should also use a different device to receive the codes or use an authentication app like the ones described here.


Password protection service (


Kurt’s key takeaways


Mary’s story sheds light on the reality many face grappling with the nightmare of identity theft and the dark web. Quick action is key, like notifying credit agencies if you discover your info is being used or has been stolen.

Remember, once on the dark web, your personal info isn’t easily erased, but you can take these steps to start removing it all. So, when it comes to your phone, securing it with updates, antivirus software, strong passwords, and cautious behavior can and will help thwart potential hackers.

Safeguarding your identity is a constant battle. However, it’s just a reality of where we are today. So, staying proactive is your best armor.

What frustrates you most about having to always be on guard when it comes to your tech and security? Do you wish our government did more to find those responsible for perpetuating the dark web and its crimes? Let us know by writing us at

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to


Answers to the most asked CyberGuy questions:

Copyright 2023 All rights reserved.

Continue Reading


Google’s whiteboarding app is joining the graveyard



Google’s whiteboarding app is joining the graveyard

It’s never a dull day at the Google graveyard — the company has blogged a Workspace update today announcing the end of its collaborative Jamboard whiteboarding software. Google plans to wind down the app in late 2024 and is introducing the “next phase” of whiteboarding solutions: pointing users toward third-party apps that work with Workspace services like Google Meet, Drive, and Calendar.

Google says it will offer support to help transition customers to use other whiteboard tools, including FigJam, Lucidspark, and Miro. According to the blog post, Workspace customer feedback indicated the third-party solutions worked better for them thanks to feature offerings like an infinite canvas size, use case templates, voting, and more. So instead of further developing Jamboard, Google’s digging its hole and will focus on core collaboration services on Docs, Sheets, and Slides.

The Jamboard app will hit its first phase-out step on October 1st, 2024. On that day, Jamboard will become a read-only app, and users will no longer be able to make new or edit old Jams on any platform. Then users will have until December 31st, 2024, to back up Jam their files, and on that date, Google will cut off access and begin permanently deleting files. Google plans to provide “clear paths” to retain and migrate Jam data to FigJam, Lucidspark, and Miro “within just a few clicks.” The resources will be available “well before” the app winds down in late 2024.

You might remember Google had a $5,000 Jamboard whiteboarding meeting room display — well, that’s also discontinued. The Jamboard hardware will no longer receive software updates on September 30th, 2024, and its license subscriptions will expire the same day. Companies and schools with an upcoming renewal may remain subscribers up to that date at a prorated amount if they’d prefer to delay transitioning as long as possible. The 55-inch Jamboard device will reach end of life on October 1st, 2024.

If you need new whiteboarding hardware for your meeting rooms, Google suggests getting its Google Meet Series One screens: the Board 65 and the Desk 27. And Google will connect educational institutions with Figma, Lucid Software, and Miro to help them transition. Google can’t send outside solutions to the graveyard since it doesn’t own the solutions.

Continue Reading